• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Deep Learning Empowered Cybersecurity Spam Bot Detection for Online Social Networks

    2022-03-14 09:28:12MesferAlDuhayyimHayaMesferAlshahraniFahdAlWesabiMohammedAlamgeerAnwerMustafaHilalandMohammedRizwanullah
    Computers Materials&Continua 2022年3期

    Mesfer Al Duhayyim,Haya Mesfer Alshahrani,Fahd N.Al-Wesabi,Mohammed Alamgeer,Anwer Mustafa Hilal*and Mohammed Rizwanullah

    1Department of Natural and Applied Sciences,College of Community-Aflaj,Prince Sattam bin Abdulaziz University,Saudi Arabia

    2Department of Information Systems,College of Computer and Information Sciences,Princess Nourah bint Abdulrahman University,Saudi Arabia

    3Department of Computer Science,King Khalid University,Muhayel Aseer,Saudi Arabia&Faculty of Computer and IT,Sana’a University,Sana’a,Yemen

    4Department of Information Systems,King Khalid University,Muhayel Aseer,Saudi Arabia

    5Department of Computer and Self Development,Preparatory Year Deanship,Prince Sattam bin Abdulaziz University,AlKharj,Saudi Arabia

    Abstract: Cybersecurity encompasses various elements such as strategies,policies, processes, and techniques to accomplish availability, confidentiality, and integrity of resource processing, network, software, and data from attacks.In this scenario, the rising popularity of Online Social Networks(OSN)is under threat from spammers for which effective spam bot detection approaches should be developed.Earlier studies have developed different approaches for the detection of spam bots in OSN.But those techniques primarily concentrated on hand-crafted features to capture the features of malicious users while the application of Deep Learning (DL) models needs to be explored.With this motivation,the current research article proposes a Spam Bot Detection technique using Hybrid DL model abbreviated as SBDHDL.The proposed SBD-HDL technique focuses on the detection of spam bots that exist in OSNs.The technique has different stages of operations such as pre-processing, classification, and parameter optimization.Besides,SBD-HDL technique hybridizes Graph Convolutional Network(GCN)with Recurrent Neural Network (RNN) model for spam bot classification process.In order to enhance the detection performance of GCN-RNN model,hyperparameters are tuned using Lion Optimization Algorithm(LOA).Both hybridization of GCN-RNN and LOA-based hyperparameter tuning process make the current work, a first-of-its-kind in this domain.The experimental validation of the proposed SBD-HDL technique,conducted upon benchmark dataset, established the supremacy of the technique since it was validated under different measures.

    Keywords:Cybersecurity;spam bot;data classification;social networks;twitter;deep learning

    1 Introduction

    Cybersecurity is a phenomenon comprised of a group of processes,methodologies,policies,and technologies which collaborate together to protect the availability, confidentiality, and integrity of software programs,computing resources,network,and data from different types of attacks[1].Cyber defense mechanism exists at network,data,application and host level.It has a plethora of tools namely,antivirus software,Intrusion Protection System(IPS),firewalls,and Intrusion Detection System(IDS)that work in silos to prevent the attacks and identify the security breaches [2].Several attackers are still at the benefits since they have to detect one susceptibility in the system that requires protection.For example, in case of an increase in the amount of internet-linked system, the attack apparently raises resulting in higher threat of attacks.Further,adversaries have become highly complex.Because the emerging malware and zero-day exploits avoid the security actions which allow them to continue for a long period of time without any announcement [3].Zero-day activities are attacks that have not been faced already,but frequently differ on known attacks.To exacerbate the problems,the attack mechanism is being commoditized,which allows the rapid distribution of challenges without requiring any knowledge about the emerging exploits.

    With the development of information patterns, there is a drastic change experienced in service modes and social networks too.Social networks provide a transmission platform in which the users could maintain, establish, and expand several inter-personal relations [4].Few common social networks Weibo, Twitter, Facebook, and so on.The significant increase in the amount of social network users is helps in the rapid growth of amount of attacks [5].Such malicious behaviour results in increasing the network loads,destroying the normal network order,privacy disclosures,and threatening of the social network reputation system which altogether results in severe loss for the ordinary users.Presently,spammers in social networks have intelligent,diverse,and complex features.When compared with conventional spam distribution that occursviae-mail, social network spams are highly complex to identify, highly deceptive, and pose a great risk to normal users.Thus, spam detections in social network platforms are valuable and significant in different scenarios of user privacy protection,public opinion analysis,network environment security,and so on.

    Social network users are increasing and their open nature makes them perfect targets for automated programs (Bots).Spam messages and malicious interaction behaviors are created using these spam bots and it severely thrashes the security and trust of social platforms [6].Thus, the efficient detection of these spam bots has significant real-world importance in the growth of OSNs.Prior researches, conducted on anomaly account recognition, have primarily concentrated on the recognition of anomaly messages/accounts using a simple relation structure or single feature set.But,spam bots have advanced in the recent years and are able to avoid the existing complex detection techniques [7].Hence, spam bots could utilize the advanced intelligence approaches to evade the present anomaly detection scheme.

    Relative studies [8] have applied ML applications in overcoming cyber challenges but did not involve DL techniques.Another author described DL method for cyber security though these techniques are narrowed-down group of cyber security applications.The study conducted by Xin et al.[9] emphasized on complete set of cyberattacks interrelated to ID and target limitations in dataset and research fields for upcoming module improvement.In Apruzzese et al.[10], the author summarized the work covering attacks exclusively compared with spam detection ID and malware analyses.However, the study did not cover malicious domain terms that are generally utilized by botnets.In Wickramasinghe et al.[11], the researchers summarized and reviewed the works that concentrated on defending cyber physical schemes.In Al-Garadi et al.[12],a review of DL and ML techniques was conducted to safeguard the IoT technologies.Being an exclusive study, it covered a broad range of cyberattack kinds,and a spectrum of DL methods including CNN,RNN and GAN for spam detection.

    Zhao et al.[13]proposed a novel semi-supervised graph embedding module on the basis of graph attention network to detect the spam bots in social networks.In this method, a detection module is created by aggregating feature and neighbour relations and a difficult technique is learnt to integrate distinct neighbourhood relations among the nodes so as to operate the directed social graph.Le et al.[14]proposed a new IDS architecture to overcome the IDS problem.The projected architecture has three major phases.The creation of a SFSDT module i.e.,feature selection method is the initial phase.The purpose of creating SFSDT is to create an optimal feature subset in original feature sets.This method is a hybrid of SFS and DT models.The next phase is to create many IDS modules for training the optimally-selected feature subsets.Several RNNs are available such as conventional RNN,LSTM,and GRU.

    Zhao et al.[15] proposed a heterogeneous stacking-based ensemble learning architecture to ameliorate the effect of class imbalance on spam detection in social network.The presented architecture contains combining and base modules.In base component,6 distinct base classifications are adapted and this classification diversity is used in the construction of a novel ensemble input member.In combination element, the researchers introduced a cost-sensitive learning to DNN training.Gnanasekar et al.[16]presented a 3-layer social bots detection technique based on DL method.Joint substance highlight extraction layer is the initial layer which focuses on the component extraction of tweet contents and its connections.In next layer,tweet metadata fleeting element gets extracted since the tweet metadata is viewed as worldly data and this transient data is utilized as LSTM contribution to extract a user’s social action transient component.Then,element intertwining layer integrates the detached joint substance with worldly highlight in order to identify the social bots.

    The current research paper develops a spam bot detection technique using hybrid DL model,named SBD-HDL.The proposed SBD-HDL model involves hybridization of Graph Convolutional Network(GCN)with Recurrent Neural Network(RNN)model for spam bot classification process.In order to improve the detection performance of GCN-RNN model,hyperparameter tuning process takes place using Lion Optimization Algorithm(LOA).The hybridization of GCN-RNN and LOAbased hyperparameter tuning process remain the novelty of current work.The proposed SBD-HDL technique was experimentally validated on a benchmark dataset and the outcomes were examined under different measures.

    2 The Proposed Model

    Fig.1 demonstrates the working process of the proposed SBD-HDL model.The proposed SBDHDL technique comprises of different stages of operations such as pre-processing,GCN-RNN-based classification,and LOA-based parameter optimization.The detailed working flow of these processes is discussed in the succeeding sections.

    2.1 Problem Formulation

    Spam bot detection is basically a binary classifier problem.It aims at creating the classification that can precisely allocate the labels to accounts in test set, according to the feature of set of social networks/trained user.This section defines the process involved.If assuming the social graph G =(V,E),then the objective of spam bot detection problem is to learn a classifier function f:N →Y.In the event of a provided training set, social network account nodes, present in set N, are categorized under accurate classes using the reliability label‘Y’with multi element data in account propagation.Each kind of data in account propagation that involve account data and network framework data must be combined efficiently.

    Figure 1:Overall process of the proposed method

    2 Phase I:Data Pre-Processing

    In data pre-processing, the input customer data is pre-processed through three stages such as data transformation, class labeling, and data normalization.Initially, the input data in .xls format is converted into.csv format.Secondary, class labeling procedure is performed where the samples are assigned for equivalent classes.Thirdly,data normalization model takes place utilizing min-max dataset as determined below.

    2.3 Phase II:Data Classification

    When OSN data is pre-processed, GCN-RNN model is used in the classification of users into either legitimate users or bots.

    In order to implement natural language processing applications like answer to questions, a knowledge base can store the relationships and entities should be created accordingly.However, the present knowledge base techniques generally lose huge number of data.It only needs the development of codec models in the graph method and softmax can be used on every node.Graph convolutional network[17]tend to recover the missing entities/relationships that could also execute the task of entity classification.The test result on few datasets shows that these network frameworks can improve the problems that arise from lost data in the knowledge base.

    Though DL has attained substantial results in few AI techniques, non-Euclidean domain data also exists widely and should be analyzed.It becomes inevitable to define the physical or molecular or biological modules using nodes and its connections with one another.Graphical modeling of this data is an optimum learning technique.Graph NN could create graph modules by disseminating the data among these nodes.However,the graph data has high complexity and robust irregularities.The present DL techniques usually consider that these nodes are interrelated and are inappropriate for this modeling type.Alternatively,convolution,a method frequently utilized in DL,could not be directly utilized in graph modeling.The objective of network-embedded technique is to maintain the locations and structure of entire nodes.

    In real-world applications like traffic flow,knowledge graphs,and social networks,huge number of data exists through a graph structure.Graph semi-supervised learning method is utilized in the management of situations in which all the nodes in data have not been labeled,while few nodes possess certain labels/categories.GCN is determined in this manner:The determination graph is,every node feature is obtained as input, and the adjacency matrix of relationship with node is A.The aim is to provide the output for feature matrix that denotes the labelled/learned data of unlabeled nodes.The equation for two layers of GCN semi-supervised node classifier is displayed in Eq.(2):

    whereW(0)implies the input of hidden layer whereas the ‘H’feature maps to hidden weight matrix.W(1)represents the hidden output weight matrix.Mainly, RNN is utilized in handling the problems related to order input and output.It can be a scalable DNN.LSTM is frequently utilized in RNN due to which this feature gets influenced by long time input.LSTM is extensively utilized in image analysis, speech modeling, text recognition, etc.Generally, regular LSTM has an issuei.e., it could not differentiate the features for significant classification of the portions.One more drawback is the complexity of exploding/vanishing gradients.The technique is to relate attention weight for every input vector,thus the output also transmits this data.As previously stated,GCN/RNN technique still could not resolve the problem of huge network structures and long training time while its efficiency is also not good in case of less data and label.Fig.2 depicts the structure of RNN model.

    Figure 2:Structure of RNN model

    The current study proposed an enhanced 2D graph CNN RNN and GCN hybrid structure for the classification of spam bots.A network module,depending upon GCN and notice LSTM,is created to construct and train the graph structures’representation on the basis of documents, relationships,and words.Thus, long-term relations and framework of whole text graphs could be maintained in an embedded graph for in-depth description of the textual connections and execution of reliable text classification [18].GCN is the initial layer of hybrid framework which includes input layer, output layer,and multiple hidden layers.Once a sequence instance is processed using an adequate length of time,the attention methods are completely utilized through data aggregation from previous times to abstract further output vectors.

    2.4 Phase III:Hyperparameter Tuning

    In order to improve the detection performance of GCN-RNN model, hyperparameter tuning process takes placeviaLOA.Lion Optimization Algorithm(LOA)is simulated based on the nature of lions.Lions mostly depict a superior level of collaboration as well as aggression.It is generally structured into two types such as Resident Lions (RL) and Nomad Lions (NL).RL usually lives in groups and are named as pride(P).The second type lives separately or rarely it also lives as pairs.Lions commonly hunt as groups.Several lionesses obligingly effort to surround the prey in different points and attack the prey.Male Lions(ML)and some lionesses go to rest and delay the hunter lioness.Lions endure mating procedure at some time while the lioness mates with several partners also.Obviously,lions mark their territories through urine.In LOA,the performances are mathematically determined to model the optimization technique.A primary population is created as a group of randomly-created solutions,in the name of lions,in LOA.At primary population(%N),certain cases are selected as NL whereas rest of the population(RL)is separated asPsubset(prides)in an arbitrary manner.S denotes the number of lionesses while the residual lions are male.

    LOA primarily creates the population in an arbitrary manner in solution space.It assumes all the solutions as ‘lion’.In order to overcome Nvdimension optimization issue, the lion is determined as follows.

    Besides, the cost (fitness value of all the lions) is defined as the estimation of cost function as provided herewith.

    In the beginning, Npopsolutions are randomly generated in search space.%N of solutions get elected as NL in an arbitrary manner.The residual populations are separated as P pride.All the solutions in LOA correspond to exact gender and continued constant in the optimization procedure.

    In each P, a definite amount of females look up to prey in group so as to feed the member in P group.This hunter lion follows specific methods to surround and catch the prey.In general,lions follow nearly similar pattern to hunt the prey.In hunting,if a hunter improves their separate fitness,the prey avoids moving to a novel place as signified in Eq.(5).

    where PRY implies the current place of prey,Hter represents the novel place of hunter to attack the prey and PRYI is the%of improvement in hunter fitness.The novel place of hunters that go to left and right wings are as follows.

    The novel places of center hunters are formed as determined in Eq.(7):

    rando(a,b)gives an arbitrary number between a and b.These hunting performances propose few advantages in attaining the optimum solutions.Thus, the territory of all prides contain individual optimum places, obtained by all the members in pride.It makes use of LOA to store the optimal solution gained before the time period which is helpful to enhance the solution in LOA.Therefore,the novel place for a Female Lion(FL)is signified as follows

    where FL defines the current place andDprovides the distance between FL’s place and the elected points selected by competition choice in pride’s territory.{R1}implies the vector and its primary point is the earlier place of FL.It concentrates on the elected place nearby {R2} and is perpendicular to{R1}.

    All the MLs inPtravel everywhere in the territory of pride.To imitate this naturally,the%R of pride territory is randomly elected and the lions travel accordingly.But,while roaming,if a resident male defines the novel place which is superior to the present place, the optimum visited solution gets upgraded.Roaming is powerful local search and makes use of LOA to search the solution so as to enhance it.NL and its adjustable roaming naturally use LOA to search the solution space in arbitrary manner and keep track of the local optimum.In previous methods,the novel places of NL are determined as follows

    whereLionistands for the current place of ithNL lions,j represents the dimensional,randojsignifies uniform arbitrary number between 0 and 1,RANDOrefers to arbitrarily-formed vector in search space,andpriindicates the probability calculated by all NLs in an independent manner as expressed below.

    where NLiand BstNLdenote the cost of current places of ithlions from NL and the optimum cost of NL correspondingly.

    Mating is a vital process that guarantee the lions to be itself and provides an opportunity for lions to connect with other members of the herd.In all Ps,%Ma of FLs mate with at least one resident male which is elected in an arbitrary manner similar to P so as to generate offspring.Mate function is a linear group of parents to produce two novel offspring.LOA connects the data between the mates and the novel cubs get characters from both the genders.

    In all the Ps, if an ML obtains maturity, it is powerful and fights with other MLs in the P.The beaten lion leaves P and develops NL.In parallel,if an NL male is actually strong,it fights with RL male in P while NL develops itself to become RL and the action continues conversely.LOA uses the defense function to keep the very powerful MLs as solution since it plays an important role in LOA.

    According to switch and migration activities,lions in one P to other gets their way of life modified and the resident female develops NL.Conversely,it enhances the variety of target pride by their place in previous pride.It also paves a way to transmit amongst lions.To all Ps,the maximal amount of females gets calculated as S% of population of P.In case of migration function, few females are randomly elected and NL is developed.If the elected FLs migrate in P and develop a NL, new and old NL females get organized according to their fitness values.The processes involved in LOA are shown in Algorithm 1.

    Algorithm 1: Pseudocode of LOA

    3 Performance Validation

    3.1 Dataset Details

    This section deals with investigation and performance of spam bot detection by the proposed SBD-HDL technique.The proposed SBD-HDL technique was tested using two datasets.Dataset 1 has 100 samples,29 attributes,and 2 class labels.Besides,dataset 2,The Twitter 1KS-10KN dataset[19,20]includes samples with two labels namely,spam bots and legitimate users.It includes a total of 11,000 nodes and 2,342,816 edges.

    3.2 Performance Measures

    In current research work,spam bot detection performance of the proposed SBD-HDL technique was evaluated using four measures such as

    ? Precision,

    ? Recall,

    ? Accuracy,and

    ? F-measure

    Accuracy can be determined as a ratio of properly classified user profiles over total number of available user profiles and can be defined using Eq.(11):

    Next, precision can be computed as a ratio of the properly-anticipated spam profiles over total number of profiles determined as‘spam’.Alternatively,it denotes the percentage of spam user profiles which are actually spam profiles.Precision can be expressed as follows.

    Then,recall is the percentage of appropriately-predicted spam profiles over a number of total real spam user profiles,as indicated herewith.

    F-measure is calculated as the weighted average of both precision and recall.It can be defined using the Eq.(14):

    3.3 Results of the Analysis

    Tab.1 shows the results of comparative analysis of SBD-HDL technique against other methods.Figs.3 and 4 shows the results for classification performance of the proposed SBD-HDL technique and other techniques before feature selection process.From the results,it is apparent that the proposed SBD-HDL approach produced the maximal classification accuracy over other ML models.When assessing the results in terms of accuracy and precision,it is evident that J48 technique accomplished the least outcome with an accuracy of 89.3% and precision of 89.40%.Next, MLP model gained a slightly increased outcome with an accuracy of 89.3%and precision of 89.40%.Then,RF technique obtained a certainly higher performance with an accuracy of 94.10% and precision of 95.60%.Followed by,NB model showcased a moderately closer result with an accuracy of 95.70%and precision of 96.50%.Though K-NN model portrayed competitive performance with an accuracy of 96.30%and precision of 98.40%,the proposed SBD-HDL technique outperformed existing methods and achieved the highest accuracy of 98.85%and precision of 99.30%.

    When investigating the outcomes with respect to recall and F-measure,it is clear that J48 manner accomplished the worst outcomes with a recall of 91.4% and an F-measure of 89.60%.In line with this,MLP method obtained somewhat improved outcome with a recall of 92.6%and an F-measure of 93.30%.Afterwards,RF technique reached a certainly higher efficiency with a recall of 93.80%and an F-measure of 94.10%.Likewise,NB technique demonstrated a moderately closer outcome with a recall of 95.70%and an F-measure of 96%.But,the K-NN model exhibited a competitive performance with a recall of 94.80% and an F-measure of 96.20%.However, the proposed SBD-HDL technique outperformed the existing methods with maximum recall of 98.10%and an F-measure of 97.50%.

    Table 1: Results of the analysis of various methods against the proposed model under different measures on dataset-1

    Figure 3:Precision and accuracy analysis:before feature selection vs.proposed method

    Figs.5 and 6 show the results of classification performance achieved by SBD-HDL manner and other such algorithms after feature selection process is over.From the outcomes, it is clear that the proposed SBD-HDL method produced maximal classification accuracy over other ML techniques.In analytical results, with respect to accuracy and precision, it is obvious that the relief manner accomplished minimum results with an accuracy of 98.10% and a precision of 98.60%.Chi-square algorithm produced slightly higher results with an accuracy of 98.5% and a precision of 98.70%.In addition, Significance manner reached a certainly higher performance with an accuracy of 98.60%and a precision of 99.20%.Besides, Information gain method outperformed the previous methods through a moderately closer resulti.e.,an accuracy of 98.70%and a precision of 98.90%.Eventually,Correlation approach demonstrated a competitive performance with an accuracy of 99.40% and a precision of 97.90%.However, the proposed SBD-HDL methodology outperformed the existing models with high accuracy of 98.85%and a precision of 99.30%.

    Figure 4:Recall and F-measure analysis:before feature selection vs.proposed method

    Figure 5:Precision and accuracy analysis:after feature selection vs.proposed method

    When observing the results in terms of recall and F-measure,it is apparent that the Relief method accomplished the least results with a recall of 97.90%and an F-measure of 97.90%.SBD-HDL model achieved somewhat higher results with a recall of 98.1%and an F-measure of 97.50%.Additionally,information gain manner attained a certainly higher performance with a recall of 98.60%and an Fmeasure of 98%.At the same time, Chi-square method exhibited a moderately closer outcome with its recall being 99% and F-measure being 98.30%.However, Significance methodology portrayed a competitive performance with a recall of 99.40%and an F-measure of 98.20%.Further,Correlation algorithm accomplished a superior recall of 99.60%and F-measure of 98.40%.

    To further confirm the improved performance of SBD-HDL technique, another comparative analysis was conducted and the results are shown in Tab.2 and Fig.7.On the applied dataset-2,DT model showcased ineffectual outcomes over other techniques.Followed by,SVM and BP models demonstrated slightly enhanced performance.Concurrently, NN technique showcased somewhat enhanced outcome over SVM and BP models.

    Figure 6:Recall and F-measure analysis:after feature selection vs.proposed method

    Table 2:Results analysis of the various methods with proposed model in terms of distinct measures on dataset-2

    Besides, MLP, GCN, GAT, RF, and GraphSAGE techniques accomplished moderately closer results.Followed by,na?ve Bayesian and ABGNN models showcased near optimal results.However,the proposed SBD-HDL technique demonstrated supreme outcomes compared to all other techniques with a maximum precision of 97.3%,recall of 96.5%,and an F1-score of 96.9%.From the aforementioned tables and figures,it is clear that the proposed SBD-HDL approach is an effectual spam bot detection tool for OSN.

    Figure 7:Comparative analysis of SBD-HDL model with existing techniques

    4 Conclusion

    The current research paper designed a new SBD-HDL technique for spam bot detection in OSN.The proposed SBD-HDL technique focuses on the detection of spam bots present in OSNs.The proposed SBD-HDL technique comprises of different stages such as pre-processing, GCN-RNNbased classification,and LOA-based parameter optimization.The hybridization of GCN-RNN and LOA-based hyperparameter tuning process is the novelty of current research study.In order to improve the detection efficiency of GCN-RNN model, hyperparameter tuning process is performed using LOA.The proposed SBD-HDL technique was experimentally validated on a benchmark dataset and the outcomes were examined under different measures.The results established the supremacy of the proposed approach.In future,the detection performance can be improved by utilizing feature selection and feature reduction approaches.

    Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(RGP 1/53/42).www.kku.edu.sa.This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-Track Path of Research Funding Program.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    黄色片一级片一级黄色片| 高清黄色对白视频在线免费看| 99久久人妻综合| 一级毛片女人18水好多| 69精品国产乱码久久久| 美女午夜性视频免费| 黄色a级毛片大全视频| 天堂√8在线中文| 12—13女人毛片做爰片一| 丝袜美足系列| 人成视频在线观看免费观看| 无遮挡黄片免费观看| 女性被躁到高潮视频| svipshipincom国产片| 超色免费av| 88av欧美| 亚洲片人在线观看| 亚洲精品在线美女| 亚洲av成人一区二区三| 夫妻午夜视频| 天天影视国产精品| 男女高潮啪啪啪动态图| 一级,二级,三级黄色视频| 午夜精品国产一区二区电影| 欧美精品一区二区免费开放| 人人妻人人爽人人添夜夜欢视频| 老司机亚洲免费影院| 成人手机av| 亚洲欧美日韩无卡精品| 欧美一级毛片孕妇| 久久久久久久久久久久大奶| 在线天堂中文资源库| 日韩 欧美 亚洲 中文字幕| 午夜视频精品福利| 美国免费a级毛片| 久久久久精品国产欧美久久久| 午夜老司机福利片| 琪琪午夜伦伦电影理论片6080| 国产欧美日韩一区二区三区在线| 9191精品国产免费久久| 99久久国产精品久久久| 少妇被粗大的猛进出69影院| 国产伦一二天堂av在线观看| 色综合欧美亚洲国产小说| 亚洲一码二码三码区别大吗| 他把我摸到了高潮在线观看| 12—13女人毛片做爰片一| 高潮久久久久久久久久久不卡| 久久这里只有精品19| 久久精品91无色码中文字幕| 久久久水蜜桃国产精品网| 美女午夜性视频免费| 日韩欧美国产一区二区入口| 亚洲精品中文字幕在线视频| 精品少妇一区二区三区视频日本电影| 中文字幕精品免费在线观看视频| 91老司机精品| 一级,二级,三级黄色视频| 久久久精品欧美日韩精品| 久久精品国产清高在天天线| 国产av一区二区精品久久| 日本欧美视频一区| 久久久久久免费高清国产稀缺| 国产人伦9x9x在线观看| 国产精品久久久人人做人人爽| 超碰成人久久| 啦啦啦在线免费观看视频4| 18美女黄网站色大片免费观看| 精品国产一区二区三区四区第35| 欧美一区二区精品小视频在线| 亚洲成人免费电影在线观看| 9热在线视频观看99| 欧美乱码精品一区二区三区| 国产国语露脸激情在线看| 91麻豆精品激情在线观看国产 | 欧美激情久久久久久爽电影 | 一二三四社区在线视频社区8| 日韩欧美一区视频在线观看| 波多野结衣高清无吗| 悠悠久久av| 色综合婷婷激情| 成在线人永久免费视频| 日日摸夜夜添夜夜添小说| 19禁男女啪啪无遮挡网站| 免费在线观看视频国产中文字幕亚洲| 久久久久久久久久久久大奶| 大型黄色视频在线免费观看| 成年人黄色毛片网站| 嫩草影视91久久| 人妻丰满熟妇av一区二区三区| 露出奶头的视频| 999久久久精品免费观看国产| av片东京热男人的天堂| 亚洲av成人av| 亚洲精品一卡2卡三卡4卡5卡| 首页视频小说图片口味搜索| 琪琪午夜伦伦电影理论片6080| 久久精品91蜜桃| av有码第一页| 中文字幕高清在线视频| 国产精品免费一区二区三区在线| 免费日韩欧美在线观看| 桃色一区二区三区在线观看| 久久草成人影院| 狂野欧美激情性xxxx| 岛国视频午夜一区免费看| av电影中文网址| 欧美日韩视频精品一区| 国产欧美日韩精品亚洲av| 欧美日韩亚洲高清精品| 免费日韩欧美在线观看| 国产精品国产高清国产av| 久久 成人 亚洲| 欧美久久黑人一区二区| svipshipincom国产片| 亚洲免费av在线视频| 国产国语露脸激情在线看| 午夜精品在线福利| 亚洲久久久国产精品| 久久人人精品亚洲av| 亚洲一区二区三区色噜噜 | 国产精品一区二区在线不卡| 一级片免费观看大全| 91麻豆精品激情在线观看国产 | 亚洲九九香蕉| 1024香蕉在线观看| 人人妻,人人澡人人爽秒播| 亚洲欧美精品综合一区二区三区| 日日爽夜夜爽网站| 久久久国产成人精品二区 | 国产精品永久免费网站| 一级,二级,三级黄色视频| 亚洲专区中文字幕在线| 夜夜躁狠狠躁天天躁| 国产国语露脸激情在线看| 成年人黄色毛片网站| 久久精品成人免费网站| 久久精品91无色码中文字幕| 国产精品自产拍在线观看55亚洲| 国产精品日韩av在线免费观看 | 18禁黄网站禁片午夜丰满| 女性生殖器流出的白浆| 黄色女人牲交| 三上悠亚av全集在线观看| 99久久久亚洲精品蜜臀av| 国产一区二区三区视频了| 国产片内射在线| 精品日产1卡2卡| 亚洲avbb在线观看| 欧美黄色淫秽网站| 黄色片一级片一级黄色片| 免费不卡黄色视频| 日本一区二区免费在线视频| 日韩有码中文字幕| 夜夜夜夜夜久久久久| 视频区图区小说| 极品人妻少妇av视频| 人人妻人人澡人人看| 一进一出抽搐动态| 欧美日本中文国产一区发布| 亚洲精品美女久久av网站| 欧美亚洲日本最大视频资源| 黑人欧美特级aaaaaa片| 色综合欧美亚洲国产小说| 欧美日韩乱码在线| 日韩欧美一区视频在线观看| 一进一出抽搐gif免费好疼 | 亚洲第一av免费看| 好男人电影高清在线观看| 超碰97精品在线观看| ponron亚洲| 一进一出抽搐gif免费好疼 | 久久精品91无色码中文字幕| 国内毛片毛片毛片毛片毛片| 日本欧美视频一区| 男女下面进入的视频免费午夜 | 亚洲avbb在线观看| 亚洲七黄色美女视频| 日韩欧美一区二区三区在线观看| 97碰自拍视频| 中文字幕精品免费在线观看视频| 伦理电影免费视频| 国产单亲对白刺激| 国产精品成人在线| 男女下面插进去视频免费观看| 黄片大片在线免费观看| 桃红色精品国产亚洲av| 欧美乱妇无乱码| 一夜夜www| 精品久久久久久久毛片微露脸| 国产精品香港三级国产av潘金莲| 欧美日本亚洲视频在线播放| 777久久人妻少妇嫩草av网站| 久久人人爽av亚洲精品天堂| 熟女少妇亚洲综合色aaa.| 国产极品粉嫩免费观看在线| 亚洲免费av在线视频| 欧美成人免费av一区二区三区| 正在播放国产对白刺激| 久久久久久久久免费视频了| 99国产精品99久久久久| 超碰成人久久| 欧美不卡视频在线免费观看 | 国产三级黄色录像| 天堂动漫精品| 久久久久久大精品| 久久中文字幕一级| 亚洲熟妇熟女久久| 亚洲熟妇中文字幕五十中出 | 在线av久久热| 熟女少妇亚洲综合色aaa.| xxx96com| 亚洲av成人一区二区三| 欧美日韩av久久| 亚洲精品中文字幕在线视频| 老司机靠b影院| 免费看a级黄色片| avwww免费| 国产亚洲欧美在线一区二区| 一夜夜www| 免费av毛片视频| 亚洲精品久久成人aⅴ小说| 黄色 视频免费看| 黑人操中国人逼视频| 一级毛片女人18水好多| 久久九九热精品免费| 深夜精品福利| 亚洲精品中文字幕一二三四区| 久久久久久人人人人人| 99精品在免费线老司机午夜| 成人国语在线视频| 色精品久久人妻99蜜桃| 淫秽高清视频在线观看| 男女做爰动态图高潮gif福利片 | 国产黄a三级三级三级人| 日韩欧美免费精品| 男人的好看免费观看在线视频 | 精品久久久久久久毛片微露脸| a在线观看视频网站| 丝袜人妻中文字幕| 久久精品亚洲av国产电影网| 高清黄色对白视频在线免费看| 亚洲人成77777在线视频| 美女高潮到喷水免费观看| 成人亚洲精品一区在线观看| 国产精品自产拍在线观看55亚洲| av有码第一页| 日本免费a在线| 免费搜索国产男女视频| 丝袜人妻中文字幕| 69精品国产乱码久久久| 国产成人一区二区三区免费视频网站| 自拍欧美九色日韩亚洲蝌蚪91| 成人亚洲精品av一区二区 | 亚洲精品成人av观看孕妇| 一级黄色大片毛片| 亚洲精品中文字幕在线视频| 国产成人欧美| 嫩草影视91久久| 日本五十路高清| 国产成年人精品一区二区 | 久久午夜综合久久蜜桃| 欧美国产精品va在线观看不卡| 午夜视频精品福利| 男女做爰动态图高潮gif福利片 | 欧美精品啪啪一区二区三区| www日本在线高清视频| 免费在线观看视频国产中文字幕亚洲| 一级黄色大片毛片| 亚洲伊人色综图| 久久精品aⅴ一区二区三区四区| 长腿黑丝高跟| 精品乱码久久久久久99久播| 成年人免费黄色播放视频| 人成视频在线观看免费观看| 99在线视频只有这里精品首页| 香蕉国产在线看| 亚洲黑人精品在线| 在线永久观看黄色视频| 精品少妇一区二区三区视频日本电影| 又黄又粗又硬又大视频| 国产精品一区二区免费欧美| 校园春色视频在线观看| 亚洲精品国产一区二区精华液| 久久久国产成人精品二区 | 久久精品91无色码中文字幕| 亚洲精品美女久久久久99蜜臀| 亚洲精品中文字幕在线视频| 丝袜在线中文字幕| 老司机靠b影院| 国产一卡二卡三卡精品| 91麻豆精品激情在线观看国产 | 少妇的丰满在线观看| av天堂久久9| 看片在线看免费视频| 日韩国内少妇激情av| 国产视频一区二区在线看| 涩涩av久久男人的天堂| 99精品欧美一区二区三区四区| 69av精品久久久久久| x7x7x7水蜜桃| 人妻丰满熟妇av一区二区三区| 国产精品99久久99久久久不卡| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲精品国产精品久久久不卡| 国产精品成人在线| 多毛熟女@视频| 亚洲国产精品合色在线| 国产亚洲精品第一综合不卡| 午夜福利,免费看| 亚洲av第一区精品v没综合| 99精品久久久久人妻精品| 精品日产1卡2卡| av网站在线播放免费| 午夜91福利影院| 91在线观看av| 亚洲一区二区三区色噜噜 | 欧美黄色片欧美黄色片| 成人三级黄色视频| 成年人免费黄色播放视频| 久久精品91无色码中文字幕| aaaaa片日本免费| 在线观看免费高清a一片| 精品一区二区三区视频在线观看免费 | 欧美日韩福利视频一区二区| 淫妇啪啪啪对白视频| 妹子高潮喷水视频| 亚洲男人天堂网一区| 国产av又大| 国产成人av激情在线播放| 亚洲熟女毛片儿| 欧美黑人欧美精品刺激| 十八禁人妻一区二区| 国内久久婷婷六月综合欲色啪| 亚洲专区字幕在线| 老汉色∧v一级毛片| 亚洲av美国av| 这个男人来自地球电影免费观看| 精品午夜福利视频在线观看一区| 9191精品国产免费久久| 国产精品综合久久久久久久免费 | 在线观看舔阴道视频| 欧美+亚洲+日韩+国产| 成人亚洲精品一区在线观看| 97超级碰碰碰精品色视频在线观看| 精品国产国语对白av| 女人高潮潮喷娇喘18禁视频| 午夜福利在线免费观看网站| av片东京热男人的天堂| 91九色精品人成在线观看| 国产精品影院久久| 叶爱在线成人免费视频播放| 久久久精品国产亚洲av高清涩受| 中文字幕高清在线视频| 人人妻,人人澡人人爽秒播| 欧美老熟妇乱子伦牲交| 国产一区二区三区在线臀色熟女 | 丝袜美足系列| 美女午夜性视频免费| 国产精品二区激情视频| 久久久久国内视频| 精品久久久久久电影网| 看免费av毛片| 色婷婷久久久亚洲欧美| 久久欧美精品欧美久久欧美| 国产真人三级小视频在线观看| 18禁美女被吸乳视频| aaaaa片日本免费| 99久久99久久久精品蜜桃| 新久久久久国产一级毛片| 亚洲欧美一区二区三区黑人| 人妻久久中文字幕网| 欧美日韩av久久| 久热这里只有精品99| 免费搜索国产男女视频| 正在播放国产对白刺激| 99久久久亚洲精品蜜臀av| 色综合站精品国产| 极品人妻少妇av视频| 精品国产国语对白av| 在线观看一区二区三区激情| av网站免费在线观看视频| 欧美日韩亚洲国产一区二区在线观看| 精品一区二区三区视频在线观看免费 | 99国产精品99久久久久| 亚洲精品在线美女| 在线免费观看的www视频| 最近最新中文字幕大全免费视频| 性少妇av在线| 99久久99久久久精品蜜桃| 日本五十路高清| 久久人妻福利社区极品人妻图片| 日本wwww免费看| 美女福利国产在线| av天堂在线播放| 51午夜福利影视在线观看| 性少妇av在线| 亚洲国产欧美网| 久久久久久人人人人人| 在线天堂中文资源库| 琪琪午夜伦伦电影理论片6080| 久久午夜亚洲精品久久| √禁漫天堂资源中文www| 欧美人与性动交α欧美软件| 好男人电影高清在线观看| 欧美激情 高清一区二区三区| 免费女性裸体啪啪无遮挡网站| 国产精品秋霞免费鲁丝片| 91老司机精品| 波多野结衣高清无吗| 精品久久久久久久毛片微露脸| 十分钟在线观看高清视频www| 又黄又粗又硬又大视频| 国产免费av片在线观看野外av| 电影成人av| 精品一区二区三区av网在线观看| 色哟哟哟哟哟哟| 丝袜美腿诱惑在线| 久久久国产成人精品二区 | 亚洲人成网站在线播放欧美日韩| 久久久久久免费高清国产稀缺| 久久精品人人爽人人爽视色| 亚洲人成伊人成综合网2020| 日韩国内少妇激情av| 丁香欧美五月| 大型av网站在线播放| 女人被狂操c到高潮| 久热爱精品视频在线9| 18禁国产床啪视频网站| 美女 人体艺术 gogo| 99久久国产精品久久久| 精品国产国语对白av| 亚洲专区中文字幕在线| 国产精品自产拍在线观看55亚洲| 97碰自拍视频| 国产激情久久老熟女| 99久久99久久久精品蜜桃| 精品人妻1区二区| 黄频高清免费视频| 久久午夜综合久久蜜桃| 一二三四在线观看免费中文在| 亚洲精品粉嫩美女一区| 美女 人体艺术 gogo| 黄色成人免费大全| 国产精品久久久人人做人人爽| 国产精品偷伦视频观看了| av国产精品久久久久影院| 无遮挡黄片免费观看| 69av精品久久久久久| 精品国产乱子伦一区二区三区| ponron亚洲| 久久久久久久精品吃奶| 午夜成年电影在线免费观看| 国产欧美日韩一区二区三区在线| 国产av精品麻豆| 亚洲精品国产色婷婷电影| 国产亚洲精品久久久久久毛片| 日本黄色日本黄色录像| 男人操女人黄网站| 美女福利国产在线| 久久久久亚洲av毛片大全| 18禁美女被吸乳视频| 精品久久蜜臀av无| 欧美人与性动交α欧美软件| 久热这里只有精品99| 久久精品成人免费网站| 高潮久久久久久久久久久不卡| 亚洲五月色婷婷综合| 国产精品日韩av在线免费观看 | 日韩欧美一区二区三区在线观看| 欧美日韩一级在线毛片| 可以在线观看毛片的网站| 新久久久久国产一级毛片| 99精国产麻豆久久婷婷| 成人黄色视频免费在线看| 中文字幕av电影在线播放| 午夜精品国产一区二区电影| 在线看a的网站| 国产激情久久老熟女| 纯流量卡能插随身wifi吗| 欧美日韩乱码在线| 怎么达到女性高潮| 色在线成人网| 欧美成狂野欧美在线观看| 日韩欧美在线二视频| 韩国精品一区二区三区| 国产av精品麻豆| 久久久久久久久免费视频了| 日本免费一区二区三区高清不卡 | 亚洲成人精品中文字幕电影 | 狠狠狠狠99中文字幕| 91麻豆av在线| 999精品在线视频| 久久人妻福利社区极品人妻图片| 丰满迷人的少妇在线观看| 亚洲少妇的诱惑av| 国产极品粉嫩免费观看在线| 国产精品久久久久成人av| 日本精品一区二区三区蜜桃| 在线av久久热| 黑人巨大精品欧美一区二区mp4| 国产成人精品在线电影| 9色porny在线观看| 日韩欧美国产一区二区入口| 男女下面插进去视频免费观看| 国产人伦9x9x在线观看| 日韩成人在线观看一区二区三区| 国产黄色免费在线视频| 老司机亚洲免费影院| 国产成年人精品一区二区 | 757午夜福利合集在线观看| 国产免费现黄频在线看| 色综合欧美亚洲国产小说| 大型黄色视频在线免费观看| 亚洲欧美一区二区三区黑人| 9191精品国产免费久久| 国产高清激情床上av| 免费在线观看亚洲国产| 久久久久国产精品人妻aⅴ院| 成人亚洲精品一区在线观看| 老司机福利观看| 欧美日本亚洲视频在线播放| 国产成人精品无人区| 国产在线精品亚洲第一网站| 妹子高潮喷水视频| 一夜夜www| 欧洲精品卡2卡3卡4卡5卡区| 亚洲av成人不卡在线观看播放网| videosex国产| 国产精品 欧美亚洲| 999久久久精品免费观看国产| 露出奶头的视频| 精品久久久久久成人av| 老汉色∧v一级毛片| 国产精品爽爽va在线观看网站 | 99国产精品一区二区蜜桃av| 成人精品一区二区免费| 亚洲av成人av| 国产高清国产精品国产三级| 亚洲片人在线观看| 大码成人一级视频| 精品人妻1区二区| 中文字幕人妻熟女乱码| 在线观看www视频免费| 中国美女看黄片| 97人妻天天添夜夜摸| 亚洲av熟女| 老司机亚洲免费影院| 免费观看人在逋| 午夜91福利影院| 成人亚洲精品一区在线观看| 可以在线观看毛片的网站| 亚洲精品一二三| 久久伊人香网站| 在线永久观看黄色视频| 久久伊人香网站| 亚洲精品国产区一区二| 视频在线观看一区二区三区| 国产成人精品久久二区二区免费| 亚洲成人国产一区在线观看| 老司机午夜十八禁免费视频| 精品少妇一区二区三区视频日本电影| 狠狠狠狠99中文字幕| 人人澡人人妻人| 精品人妻在线不人妻| 日本撒尿小便嘘嘘汇集6| 丰满迷人的少妇在线观看| 国产真人三级小视频在线观看| 性少妇av在线| 男人舔女人的私密视频| 欧美日韩视频精品一区| 黄网站色视频无遮挡免费观看| a级毛片在线看网站| 色婷婷久久久亚洲欧美| 免费在线观看视频国产中文字幕亚洲| 亚洲五月婷婷丁香| 50天的宝宝边吃奶边哭怎么回事| 欧美日韩瑟瑟在线播放| 国产一区二区在线av高清观看| 久久人妻av系列| 男女下面进入的视频免费午夜 | 女生性感内裤真人,穿戴方法视频| 大码成人一级视频| 老熟妇仑乱视频hdxx| av福利片在线| 亚洲中文字幕日韩| 嫁个100分男人电影在线观看| 黄色成人免费大全| 亚洲精华国产精华精| 变态另类成人亚洲欧美熟女 | 欧美成人性av电影在线观看| 热99国产精品久久久久久7| 久久99一区二区三区| 日韩国内少妇激情av| 亚洲九九香蕉| 一本综合久久免费| 日韩欧美免费精品| 国产免费男女视频| 免费女性裸体啪啪无遮挡网站| 91在线观看av| 国产精品av久久久久免费| 日韩免费高清中文字幕av| 日韩欧美免费精品| 欧美人与性动交α欧美软件| 成在线人永久免费视频| 国产成+人综合+亚洲专区| 91av网站免费观看| 超碰成人久久| 在线看a的网站| 久久久久国产精品人妻aⅴ院| 一夜夜www| 国产精品国产高清国产av| 日韩av在线大香蕉| 久久久久国产精品人妻aⅴ院| 亚洲一码二码三码区别大吗|